Analysis

  • max time kernel
    145s
  • max time network
    146s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22-12-2024 05:21

General

  • Target

    JaffaCakes118_0779758d966b32a1b75152499c4ccfe051bbf9aeabbd797a55bee14a92588d76.exe

  • Size

    1.3MB

  • MD5

    31fffc3c05843e3562d2a758775c5b6b

  • SHA1

    244309022eafbffeb761e3223cb8942c916cba57

  • SHA256

    0779758d966b32a1b75152499c4ccfe051bbf9aeabbd797a55bee14a92588d76

  • SHA512

    f8095b134aa68e6aeea27308614836c1eb0aa36cc11940d1470b70eb66260fd2b661b93b8044b473f0af9f5aca7ef958bce27b51e2d19e050485af2d8432b263

  • SSDEEP

    24576:U2G/nvxW3Ww0t6TnzGmVBDh4+aknuRRZJND0gFJ4rD/IjC:UbA30GnzV/q+DnsXg

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Process spawned unexpected child process 24 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • DCRat payload 11 IoCs

    Detects payload of DCRat, commonly dropped by NSIS installers.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 9 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 12 IoCs
  • Loads dropped DLL 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs 12 IoCs
  • Drops file in System32 directory 3 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Scheduled Task/Job: Scheduled Task 1 TTPs 24 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 25 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0779758d966b32a1b75152499c4ccfe051bbf9aeabbd797a55bee14a92588d76.exe
    "C:\Users\Admin\AppData\Local\Temp\JaffaCakes118_0779758d966b32a1b75152499c4ccfe051bbf9aeabbd797a55bee14a92588d76.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2312
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2880
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\providercommon\1zu9dW.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2196
        • C:\providercommon\DllCommonsvc.exe
          "C:\providercommon\DllCommonsvc.exe"
          4⤵
          • Executes dropped EXE
          • Drops file in System32 directory
          • Drops file in Program Files directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2204
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2256
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\SysWOW64\MUI\OSPPSVC.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1604
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\NetHood\DllCommonsvc.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2484
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\lsm.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2488
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\wininit.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:2480
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1884
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1816
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\providercommon\csrss.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1324
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\All Users\Templates\wininit.exe'
            5⤵
            • Command and Scripting Interpreter: PowerShell
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:1432
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\PrLydyivWX.bat"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:2500
            • C:\Windows\system32\w32tm.exe
              w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
              6⤵
                PID:1036
              • C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe
                "C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe"
                6⤵
                • Executes dropped EXE
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:2720
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\0PvuKmrV6l.bat"
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:628
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    8⤵
                      PID:1736
                    • C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe
                      "C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe"
                      8⤵
                      • Executes dropped EXE
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      • Suspicious use of WriteProcessMemory
                      PID:2020
                      • C:\Windows\System32\cmd.exe
                        "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\gWC6ojzqIZ.bat"
                        9⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2116
                        • C:\Windows\system32\w32tm.exe
                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                          10⤵
                            PID:2308
                          • C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe
                            "C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe"
                            10⤵
                            • Executes dropped EXE
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2280
                            • C:\Windows\System32\cmd.exe
                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\D2zd9hDRps.bat"
                              11⤵
                                PID:2476
                                • C:\Windows\system32\w32tm.exe
                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                  12⤵
                                    PID:288
                                  • C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe
                                    "C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe"
                                    12⤵
                                    • Executes dropped EXE
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:1324
                                    • C:\Windows\System32\cmd.exe
                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\6n1oUPmZQq.bat"
                                      13⤵
                                        PID:2804
                                        • C:\Windows\system32\w32tm.exe
                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                          14⤵
                                            PID:820
                                          • C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe
                                            "C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe"
                                            14⤵
                                            • Executes dropped EXE
                                            • Suspicious behavior: EnumeratesProcesses
                                            • Suspicious use of AdjustPrivilegeToken
                                            PID:2208
                                            • C:\Windows\System32\cmd.exe
                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\8Lq6d7xQt2.bat"
                                              15⤵
                                                PID:1956
                                                • C:\Windows\system32\w32tm.exe
                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                  16⤵
                                                    PID:2448
                                                  • C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe
                                                    "C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe"
                                                    16⤵
                                                    • Executes dropped EXE
                                                    • Suspicious behavior: EnumeratesProcesses
                                                    • Suspicious use of AdjustPrivilegeToken
                                                    PID:2968
                                                    • C:\Windows\System32\cmd.exe
                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Mw1PlbJmoj.bat"
                                                      17⤵
                                                        PID:1564
                                                        • C:\Windows\system32\w32tm.exe
                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                          18⤵
                                                            PID:1524
                                                          • C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe
                                                            "C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe"
                                                            18⤵
                                                            • Executes dropped EXE
                                                            • Suspicious behavior: EnumeratesProcesses
                                                            • Suspicious use of AdjustPrivilegeToken
                                                            PID:2256
                                                            • C:\Windows\System32\cmd.exe
                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\Bf5uratM3O.bat"
                                                              19⤵
                                                                PID:2956
                                                                • C:\Windows\system32\w32tm.exe
                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                  20⤵
                                                                    PID:2216
                                                                  • C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe
                                                                    "C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe"
                                                                    20⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                    PID:2016
                                                                    • C:\Windows\System32\cmd.exe
                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\B7rL9EqqPR.bat"
                                                                      21⤵
                                                                        PID:2036
                                                                        • C:\Windows\system32\w32tm.exe
                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                          22⤵
                                                                            PID:2984
                                                                          • C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe
                                                                            "C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe"
                                                                            22⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                            PID:2176
                                                                            • C:\Windows\System32\cmd.exe
                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\MsMShxucCb.bat"
                                                                              23⤵
                                                                                PID:2516
                                                                                • C:\Windows\system32\w32tm.exe
                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                  24⤵
                                                                                    PID:320
                                                                                  • C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe
                                                                                    "C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe"
                                                                                    24⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious behavior: EnumeratesProcesses
                                                                                    • Suspicious use of AdjustPrivilegeToken
                                                                                    PID:864
                                                                                    • C:\Windows\System32\cmd.exe
                                                                                      "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\vXy3H03RZr.bat"
                                                                                      25⤵
                                                                                        PID:2860
                                                                                        • C:\Windows\system32\w32tm.exe
                                                                                          w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                          26⤵
                                                                                            PID:1880
                                                                                          • C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe
                                                                                            "C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe"
                                                                                            26⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious behavior: EnumeratesProcesses
                                                                                            • Suspicious use of AdjustPrivilegeToken
                                                                                            PID:2824
                                                                                            • C:\Windows\System32\cmd.exe
                                                                                              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\5pDZQI1oOH.bat"
                                                                                              27⤵
                                                                                                PID:2112
                                                                                                • C:\Windows\system32\w32tm.exe
                                                                                                  w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                                                                                                  28⤵
                                                                                                    PID:1696
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 10 /tr "'C:\Windows\SysWOW64\MUI\OSPPSVC.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2684
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Windows\SysWOW64\MUI\OSPPSVC.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3064
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 14 /tr "'C:\Windows\SysWOW64\MUI\OSPPSVC.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2220
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 13 /tr "'C:\Users\Default\NetHood\DllCommonsvc.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:824
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "DllCommonsvc" /sc ONLOGON /tr "'C:\Users\Default\NetHood\DllCommonsvc.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1784
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "DllCommonsvcD" /sc MINUTE /mo 12 /tr "'C:\Users\Default\NetHood\DllCommonsvc.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2124
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "lsml" /sc MINUTE /mo 5 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\lsm.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1636
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\lsm.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2572
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Recovery\1b8b1de2-69f6-11ef-9774-62cb582c238c\lsm.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:532
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 9 /tr "'C:\providercommon\wininit.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2004
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\providercommon\wininit.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2804
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 14 /tr "'C:\providercommon\wininit.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2840
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\csrss.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2420
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1420
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 6 /tr "'C:\MSOCache\All Users\{90140000-0019-0409-0000-0000000FF1CE}-C\csrss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2808
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 10 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:1268
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "explorer" /sc ONLOGON /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2704
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "explorere" /sc MINUTE /mo 12 /tr "'C:\Program Files (x86)\Windows Photo Viewer\en-US\explorer.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:3048
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 7 /tr "'C:\providercommon\csrss.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:620
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:564
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "csrssc" /sc MINUTE /mo 12 /tr "'C:\providercommon\csrss.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2000
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 12 /tr "'C:\Users\All Users\Templates\wininit.exe'" /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2448
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "wininit" /sc ONLOGON /tr "'C:\Users\All Users\Templates\wininit.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:376
                                            • C:\Windows\system32\schtasks.exe
                                              schtasks.exe /create /tn "wininitw" /sc MINUTE /mo 11 /tr "'C:\Users\All Users\Templates\wininit.exe'" /rl HIGHEST /f
                                              1⤵
                                              • Process spawned unexpected child process
                                              • Scheduled Task/Job: Scheduled Task
                                              PID:2296

                                            Network

                                            MITRE ATT&CK Enterprise v15

                                            Replay Monitor

                                            Loading Replay Monitor...

                                            Downloads

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              1a441883684e0d1aa0259c5fc5b0211d

                                              SHA1

                                              92f347f71e0267588d8ba7f60ce0015f6ee7cb22

                                              SHA256

                                              42c9a751b9d1a8c23306cdcb12b1a571b302e91d828a999f12fb8465df99c388

                                              SHA512

                                              81c243219f56679639dc6ec1972db610c76e415b96bedfcb9d976858ec0924eb68072c17c2f154f847bdda431915330006b886e3f68148473f530275cbc9fcc9

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              40234f0f8ff1676732e6900c9b8e384c

                                              SHA1

                                              8df7c4119a40cbc4cb6e2a32f0e78dcdd8183340

                                              SHA256

                                              bf48a0f308965661bf4d5d9bdea7f323b86884eb4daf3857ad797aedd1581af4

                                              SHA512

                                              24523382fd5f66e867c37bbc52966aa5182b8597333eb6488b82b4d25360af40a247d4303a59887023311c9218d2c3535781e3f492c80d9602aefdf99fdd12d0

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              8853505cf76224f0fedd09b303461327

                                              SHA1

                                              9f678572f1b28d21859f8de7480e56c396d47ebd

                                              SHA256

                                              7d447cdcab1cca1a29a434dd589151951cd40d89d856ea3a0023351666991084

                                              SHA512

                                              d88ea6d310d68e54b5a18153b2a41dee55a4c115462212d05620392c77bda4f8aeda4a95b099825356b0ca3474eae7a517a081efbf59a31c5d6fd6314b9c19e6

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              6bc76138a949804bc4980d9a8a7c328d

                                              SHA1

                                              f0ebd930788738fbd984763f6ee6f23aa7f60682

                                              SHA256

                                              6d54eec8c38f385f76c73eb378c310eac9c4344745c7cf2827f993041b747f0d

                                              SHA512

                                              70eb20a0ed79c4d9cc989206a2e6a19b55dc2a6ad751f0380a5bf3c388f56bfa5aab6dcbf56e9404eb9f43f3d7a6fe86191a2194f5a5ba8fd8ef0f043a71bfaf

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              ca2dec82f90807c83255e7ba46c350f1

                                              SHA1

                                              96a8982e5252c89c8a0cc3f8da6e6163de868535

                                              SHA256

                                              2840cdc8b926bb5f0f0f6307a975ac59f09eb4a3b896845e97b9799510b9a7e8

                                              SHA512

                                              b423129cfae86ddf989ee84cd6b41ed838802407c55c4a17b56330f707dbf1d860b072a10b6ea5340c35236ee9ab56947d05afd04209d564db25a1a8d9b02380

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              c12e7e5a8fc35f0da345560c435b58c8

                                              SHA1

                                              85420d411813a1f13fb5cc429071d319da57e267

                                              SHA256

                                              fe1d2a1edd8d80a1d97790f5dc8e4ce646ff59c9d11a4c433208192c859f0ce3

                                              SHA512

                                              9e0ae439ee9423562c8243474550981f6f941e5e0bb8bae3d809bb2e3d021efbd1534c25f450c9a3afa84ef8d4472d7931d634782662b89f2568c88d4d1d2d6c

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              18c12af122f23663e77578bf8921e19e

                                              SHA1

                                              a30c2f7c7fef19ebb921fe15db9ebc7551f7d5cf

                                              SHA256

                                              8846ea705436a82155f6b387c43098c215f9e5da97533f5332958281dabcb32c

                                              SHA512

                                              ee4541eebcc072019ab95138dce8fb61d04e86920096ed94140ab8b290908121984d60e741b9669f4023971e220f1df2012ae82661b30f64003c3c1993d855b7

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              8e00d1144297b959cb86df53d239686c

                                              SHA1

                                              07994a8ece9039a330e64e3df1a93102164cc749

                                              SHA256

                                              18043ee4acb02f855c65c6aac6210e8f78bb1fd2c4c310dcc617b9604267bcb0

                                              SHA512

                                              a28f34e7ccde080785b0055a074d1fceb5cf1ea9d4cb78601001cf4147a59bed5f549b92d8ddd37ddeed157702280ee632d465dbc0b0974e0350c38dc200a101

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              8771ae60c2ada2c5bcc53887e3a5a759

                                              SHA1

                                              9813c3ae3287357d5007555ce209c54fbe9b2b7b

                                              SHA256

                                              029ae6ae11125390bcbb4456fe5b3c89f1b120abd3c2176c004c3995c366898e

                                              SHA512

                                              e59d0e0691d86692f3305b23a30fcb6111de891979d3fd342b3f2a209a04bb9a261206af098186a11491170fec0b6f0cb8252cbad55fbdc116d1c2f8fd5c61fe

                                            • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                                              Filesize

                                              342B

                                              MD5

                                              799f16f18e29c1891fb1e94f0fd4788d

                                              SHA1

                                              004ded53b462ecae1bccc12511c2dd32021f326b

                                              SHA256

                                              9dc3985517b78f59d2ba3fd311c0e5146e1d4a9e6ce797dbb788499a4db3cb85

                                              SHA512

                                              4f42d9a5dfdf8a8305d44fd448db1bc47a7a5ab71d5e70453be30016fcbe42cc6a5fe5041cd0f334b5ec5d0af7534a654e1317b38bb099b076177535ddfeca98

                                            • C:\Users\Admin\AppData\Local\Temp\0PvuKmrV6l.bat

                                              Filesize

                                              227B

                                              MD5

                                              97671e3bc6cd23cc5ba8f0b84fc92d5d

                                              SHA1

                                              57597f7c057ed2965aeb1d4a9854341f4f3d00a3

                                              SHA256

                                              7f1e8a6ac1bd42a755e8b93fa1c2c091f5105f1c8eb1f63cd780cc9abb9585e4

                                              SHA512

                                              e5ba0f0e104b27bcf3ee5d7c9139c298f81e1c7ea8d139e0dcc6313f12c9079cf4103bd0dc38edb261595c359b0a5aeec5627521943ae4547d2e84730382b0ad

                                            • C:\Users\Admin\AppData\Local\Temp\5pDZQI1oOH.bat

                                              Filesize

                                              227B

                                              MD5

                                              d2a717e707573c73c42cd9cfe3dafc26

                                              SHA1

                                              593b38360eaff936497470e54fa908f274d7810c

                                              SHA256

                                              a6ac0f203704ac45b32c3243ed9654ff6baf74c068fc36dc4a732e63d3e1c6ad

                                              SHA512

                                              54253b26c89ac4bc842b0822432d80c59420ab7aa90d9b12550409e62a945b78966c479f6c4bcfdcb4ae3fe09b3b14d7dacce9ba0dfe3e70a2ef09b57a99ae7b

                                            • C:\Users\Admin\AppData\Local\Temp\6n1oUPmZQq.bat

                                              Filesize

                                              227B

                                              MD5

                                              a0541339d412677cb7282c843ebd0a09

                                              SHA1

                                              5a69af0fddf787d91b5ed580f5f2a31d9fb499f0

                                              SHA256

                                              7cf2204232405050cc5cb3ff40ff73a126f4c32b9b839a309fb350d5e8660dc8

                                              SHA512

                                              dea27e6b464fd512b602c8d7797337da162ac66c845d83a7408574dc07e48e0e45f5d8c25e2dedf9b651489e57e09291d948e08af5da72d6e37b8fe655a5f521

                                            • C:\Users\Admin\AppData\Local\Temp\8Lq6d7xQt2.bat

                                              Filesize

                                              227B

                                              MD5

                                              41b55b248a98ea206c7329e6a732c1ea

                                              SHA1

                                              dfdaa715bf151ac1144d13d5c5e137d2690cce61

                                              SHA256

                                              e80c5a4612eef4bc5e362d1d272acca1410f211c48539372c9539cd66638e913

                                              SHA512

                                              bab02ea5547cae8a6b039e9e117556fb104db319fd6cd3db13279dca3ae461c0dcc260760fd649d1542a937f5a33e78d0dfe477177c7e167b656feee60ffb01e

                                            • C:\Users\Admin\AppData\Local\Temp\B7rL9EqqPR.bat

                                              Filesize

                                              227B

                                              MD5

                                              e2de919aa581f5616526f71f50676616

                                              SHA1

                                              6e3e82563ada23823f5bbba7d09e5f180fcc52f5

                                              SHA256

                                              534cd5ea4364a9cebd4c202c097c277af76c027ef96af2775051617a7b2fa514

                                              SHA512

                                              2a1cedb6bf0e87b4927472790bad71ea2ed029fa36ba102dd4c9b6f2cdadfebc63aa68f87c51d545a4ac6dbf2dff1d8f61f9dac0baae9fad21881f5dba52c109

                                            • C:\Users\Admin\AppData\Local\Temp\Bf5uratM3O.bat

                                              Filesize

                                              227B

                                              MD5

                                              62337480d597088c25cd527760d4f108

                                              SHA1

                                              4b76b511b62ec1c3de0b2d1a8ca463c2c5c9d744

                                              SHA256

                                              1617bcbe2ae4edac7838c2d69d52e3d74259651a6ed7cf5a2f20d31c5fb15ee0

                                              SHA512

                                              2b02a20121050c9ab7c8b3003c782175c27e33c702a4c88f25eb321abb94ccfc6c796cb6e2fb478adf19bf236c73dadde3331248cea5ec6334b8d7ff2f65b3a6

                                            • C:\Users\Admin\AppData\Local\Temp\CabD30A.tmp

                                              Filesize

                                              70KB

                                              MD5

                                              49aebf8cbd62d92ac215b2923fb1b9f5

                                              SHA1

                                              1723be06719828dda65ad804298d0431f6aff976

                                              SHA256

                                              b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

                                              SHA512

                                              bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

                                            • C:\Users\Admin\AppData\Local\Temp\D2zd9hDRps.bat

                                              Filesize

                                              227B

                                              MD5

                                              7398d7ee0719c7e9e60977aa19313029

                                              SHA1

                                              88a116915af475ed00cbb433d532db1d7ee49f46

                                              SHA256

                                              110ce431e9e9414f7bcc9c3d43e6f049a201b095619e32e88b1b273ee1ae9ac0

                                              SHA512

                                              e33c84c52c3b903080eb2dbbf776f3881688d8951aecc3f4a6648f21f5499bb8d0c0ea4ee9feff02a1648f979d4cf11bf5099e67220e4411219ae14c84dc03fe

                                            • C:\Users\Admin\AppData\Local\Temp\MsMShxucCb.bat

                                              Filesize

                                              227B

                                              MD5

                                              b1db0eaf9fab6bf1ac11f9643199361f

                                              SHA1

                                              7c51f759757f6507b0b7f152ad80736c38256604

                                              SHA256

                                              e54787ec9b14bae7fbb5564de7b41f231e220ea104100c8d857ef0d035710c22

                                              SHA512

                                              3a0e02ca864db2777d5be1ff8f6aae40495f6caec783ed5860a5d43f18c0bf33998a3a167b83c1a4767c945d887d21c3c76cd5c33d6ce79cd43b53b194e03b20

                                            • C:\Users\Admin\AppData\Local\Temp\Mw1PlbJmoj.bat

                                              Filesize

                                              227B

                                              MD5

                                              0e1e15ec40ed60dc8ffffb1b6811b9c7

                                              SHA1

                                              ea924a9bd0991308b2e980310bd45cedd88cd9a9

                                              SHA256

                                              9edde1c6ca8492c3cb6e400e196df80ae7479dee1d92f30d880a9d974de3bce0

                                              SHA512

                                              9ec7cd9f3df27f5daade6e6db05f2ed70e3853e033bc413eab6e71f554da4399c3af7ac03770f5ba6fecf251fcc292a993782c25f9022cf5d06d4bdf6b919e4c

                                            • C:\Users\Admin\AppData\Local\Temp\PrLydyivWX.bat

                                              Filesize

                                              227B

                                              MD5

                                              8420ca242684196c433e30e7fd24b6fd

                                              SHA1

                                              c1996c1960672db73e62693d36dc5a035ede75a2

                                              SHA256

                                              ce447343f79b0dadbc701095599b11047a6acf82d9617b7e92b93d77e4e86e85

                                              SHA512

                                              897e53cb22a3b5df1255f4e7bcecdc8f63587a93775306021335ba477ed4d0d612ebbf9bab5785900b3c998bd5d560e58f798a0123388197f49d39e888e7403d

                                            • C:\Users\Admin\AppData\Local\Temp\TarD31C.tmp

                                              Filesize

                                              181KB

                                              MD5

                                              4ea6026cf93ec6338144661bf1202cd1

                                              SHA1

                                              a1dec9044f750ad887935a01430bf49322fbdcb7

                                              SHA256

                                              8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

                                              SHA512

                                              6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

                                            • C:\Users\Admin\AppData\Local\Temp\gWC6ojzqIZ.bat

                                              Filesize

                                              227B

                                              MD5

                                              87c1396a030bf10cb0a00f8465037c37

                                              SHA1

                                              f57675e1e744f295a7a972be70ba46b8aabda8d1

                                              SHA256

                                              0bb6f2ea8cdf44d8e41f2a044bfbb707de84701a3d81d6c79f386f5598622b8a

                                              SHA512

                                              d8778867094d6747e52378198967bfe4e36cb1150c6d2946b9e2bdc955c1420d23f0ebcb5993f2e3df4bf29b2808bb0b71726e85623ba680a9ffd48969953968

                                            • C:\Users\Admin\AppData\Local\Temp\vXy3H03RZr.bat

                                              Filesize

                                              227B

                                              MD5

                                              6abfa89870648b1f674d63a6c4f144fd

                                              SHA1

                                              17765585c54747e9644ff8f5b80adce02b381345

                                              SHA256

                                              c8902d5f9bf5354aa7e7ba1358930b7f1c5c527a4273b72c7b9519922d00720d

                                              SHA512

                                              ab2992e1c57d6cc6b808d85a00d726c3c450db14bb4db3417881a47aec39b99f2b1d83aec3d7498d8e3a3eb62f64e348a4ab55b88c80b3a9fc75533f6c11405a

                                            • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

                                              Filesize

                                              7KB

                                              MD5

                                              15db2a11dd770b4f1a9a9828092af5e8

                                              SHA1

                                              88bf0bebbd52d88daeb5e9473a268d28f6e57b39

                                              SHA256

                                              3d6e8a8fad953b3d36c27a17e482124add1c83cd775032c5e08f8c6ac821b8f3

                                              SHA512

                                              68f69dcfc900b303539aa7c519ca331ded32e9a2f941951521b68895da69cca41e943a53546cfae583d5d2c3789837cdb654d082150bcec7a1c70d7b8459e48c

                                            • C:\providercommon\1zu9dW.bat

                                              Filesize

                                              36B

                                              MD5

                                              6783c3ee07c7d151ceac57f1f9c8bed7

                                              SHA1

                                              17468f98f95bf504cc1f83c49e49a78526b3ea03

                                              SHA256

                                              8ab782f0f327a2021530e7230d3aee8abbecb7eed59482a3a46e78b9e3862322

                                              SHA512

                                              c6012d4bfac1ed14d0fd9f0eabd0e1c3d647b343db292a907b246271d52a4b7469c809db43910ddba2e8c5045f9cb3d24d0af62d363281e6cb8b39ee94a183e8

                                            • C:\providercommon\yTUdeXjbLOhnrN32dgrxVg.vbe

                                              Filesize

                                              197B

                                              MD5

                                              8088241160261560a02c84025d107592

                                              SHA1

                                              083121f7027557570994c9fc211df61730455bb5

                                              SHA256

                                              2072cc9a4a3b84d4c5178ab41c5588eea7d0103e3928e34d64f17bf97f3d1cc1

                                              SHA512

                                              20d9369dd359315848ea30144383a0bb479d86059fdbc3b3256ac84f998193512feb3b1799ab663619920c99fe7e0ebba33ada31a3855094b956fcd351c90478

                                            • \providercommon\DllCommonsvc.exe

                                              Filesize

                                              1.0MB

                                              MD5

                                              bd31e94b4143c4ce49c17d3af46bcad0

                                              SHA1

                                              f8c51ff3ff909531d9469d4ba1bbabae101853ff

                                              SHA256

                                              b5199d3eb28e7de8ec4a5de66cb339a03d90b297e2292473badaab98ade15c63

                                              SHA512

                                              f96658bd19b672fd84038bd7e95c89e14f4e6f84e3ce9c6fe3216861a41203406148c6a809c2ab350d0d6c5919c845f619deb1fc9b1f1814dfce87e566bc2394

                                            • memory/864-625-0x0000000000250000-0x0000000000360000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/864-626-0x0000000000140000-0x0000000000152000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/1324-267-0x0000000001180000-0x0000000001290000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2016-506-0x0000000000E50000-0x0000000000F60000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2020-146-0x0000000000230000-0x0000000000340000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2204-14-0x00000000001D0000-0x00000000001E2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/2204-17-0x0000000000510000-0x000000000051C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2204-16-0x0000000000500000-0x000000000050C000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2204-15-0x00000000001E0000-0x00000000001EC000-memory.dmp

                                              Filesize

                                              48KB

                                            • memory/2204-13-0x00000000011D0000-0x00000000012E0000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2208-327-0x0000000001370000-0x0000000001480000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2256-446-0x00000000002D0000-0x00000000003E0000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2280-207-0x00000000001D0000-0x00000000001E2000-memory.dmp

                                              Filesize

                                              72KB

                                            • memory/2280-206-0x00000000009B0000-0x0000000000AC0000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2480-54-0x0000000002170000-0x0000000002178000-memory.dmp

                                              Filesize

                                              32KB

                                            • memory/2488-53-0x000000001B790000-0x000000001BA72000-memory.dmp

                                              Filesize

                                              2.9MB

                                            • memory/2720-87-0x0000000000C70000-0x0000000000D80000-memory.dmp

                                              Filesize

                                              1.1MB

                                            • memory/2824-686-0x0000000000080000-0x0000000000190000-memory.dmp

                                              Filesize

                                              1.1MB